Re: Question about TSIG, AD/AA, and AXFR

Edward Lewis <lewis@tislabs.com> Tue, 17 July 2001 14:55 UTC

Received: from psg.com (exim@psg.com [147.28.0.62]) by ietf.org (8.9.1a/8.9.1a) with SMTP id KAA22891 for <dnsext-archive@lists.ietf.org>; Tue, 17 Jul 2001 10:55:39 -0400 (EDT)
Received: from lserv by psg.com with local (Exim 3.31 #1) id 15MVFG-000Hzo-00 for namedroppers-data@psg.com; Tue, 17 Jul 2001 06:50:38 -0700
Received: from h-135-207-10-122.research.att.com ([135.207.10.122] helo=roam.psg.com) by psg.com with esmtp (Exim 3.31 #1) id 15MVFG-000Hzi-00 for namedroppers@ops.ietf.org; Tue, 17 Jul 2001 06:50:38 -0700
Received: from randy by roam.psg.com with local (Exim 3.30 #1) id 15MVFF-0000D5-00 for namedroppers@ops.ietf.org; Tue, 17 Jul 2001 09:50:37 -0400
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
From: Edward Lewis <lewis@tislabs.com>
To: Brian Wellington <Brian.Wellington@nominum.com>
Cc: Edward Lewis <lewis@tislabs.com>, namedroppers@ops.ietf.org
Subject: Re: Question about TSIG, AD/AA, and AXFR
In-Reply-To: <Pine.BSF.4.33.0107162132450.56953-100000@shell.nominum.com>
References: <E15MI1g-000IVw-00@psg.com>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Message-Id: <E15MVFG-000Hzo-00@psg.com>
Date: Tue, 17 Jul 2001 06:50:38 -0700
Content-Transfer-Encoding: 7bit

At 12:40 AM -0400 7/17/01, Brian Wellington wrote:
>Are you talking about the stub resolver directly contacting a secondary?
>It should be going through a recursive server, and the recursive server
>will validate the data.  If the data on the secondary has been corrupted
>or maliciously altered, the recursive server will fail to verify it.

Yeah.  I am assuming that the "client" in this case isn't able to establish
a chain of trust (no code to do so or at least no configured key).  Perhaps
the "secondary" is also the "default/recursive" server for the client, or
that the client has a configured relationship with the authoritative
servers.

>About the worst can happen is that the secondary can serve data that's no
>longer in the zone but still valid, but the same thing can happen with any
>caching server.

If the client (I'll use that term) is relying on TSIG, they aren't likely
to do signature validation.  (Perhaps we should recommend that TSIG queries
be issued with the DNSSEC indication off.)

There is also the push to adopt TSIG ahead of signing zones.  I can see a
lot of zones using TSIG in limited runs well ahead of signing the zone - as
folks first see the benefit of TSIG, then see how hard it is to manage
secerts, and then discover the benefit of scaleable but more intensive
public key efforts.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis                                                NAI Labs
Phone: +1 443-259-2352                      Email: lewis@tislabs.com

You fly too often when ... the airport taxi is on speed-dial.

Opinions expressed are property of my evil twin, not my employer.




to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.